Skip to main content

Detection of Cyber-Attacks

  • Chapter
  • First Online:
  • 2568 Accesses

Abstract

Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours. They deliberately limit the amount of data they steal at any one-time and use common protocols like HTTP or SSL. Hackers also choose a logical pivot point to attack that allows them to spread their malware across the hospital network. The attention of medical equipment operators and the building maintenance engineers is critical to detection of unusual operations and they are usually the first to notice anomalies in equipment and system behavior.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    HTTP=Hypertext Transfer Protocol and SSL is Secure Sockets Layer

  2. 2.

    HMI is the Human Machine Interface, typically a computer monitor.

  3. 3.

    OPC is the interoperability standard for the secure and reliable exchange of data in the industrial automation space and in other industries.

  4. 4.

    A script kiddie is an unskilled individual (typically juvenile) who uses scripts or programs developed by others to attack computer systems and networks and deface websites. Their objective is to try to impress their friends or gain credit in computer-enthusiast communities.

  5. 5.

    A zero-day exploit attack is a worm, virus, or other cyber-threat that hits users on the same day that the vulnerability is announced.

  6. 6.

    “Secure Data Transfer Guidance for Industrial Control and SCADA Systems,” Pacific Northwest National Labs, PNNL-20776, Sept. 2011.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Luis Ayala

About this chapter

Cite this chapter

Ayala, L. (2016). Detection of Cyber-Attacks. In: Cybersecurity for Hospitals and Healthcare Facilities. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2155-6_6

Download citation

Publish with us

Policies and ethics